{"title":"Artificial Butterfly Optimization based Cluster Head Selection with Energy Efficient Data Aggregation model for Heterogeneous WSN Environment","authors":"S. Venkatasubramanian, R. Vijay, S. Hariprasath","doi":"10.1109/ICCMC56507.2023.10083550","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083550","url":null,"abstract":"The WSN is a new and urgent technology with many potential uses, including but not limited to health security, environmental monitoring, etc. Due to lower battery capacity, WSN has a restricted-energy resource. In order to solve the issue of unequal energy consumption among nodes, it is necessary to choose a sensor node from a cluster with more than enough power to make up for the weaker nodes. This paper develops the idea of heterogeneous WSN (H-WSN), which provides supplementary energy to the heterogeneity network. One method that has shown promise in overcoming this difficulty is the clustering technique, which optimizes energy consumption and extends the useful life of a sensor network. Even if the existing approaches function well, the computational complexity may rise due to the usage of a single mobile sink in their studies. As an alternative to communication among each CH and sink through a separate hop, the network uses Multiple Mobile Sinks (MMSs). The combination of the data collection and aggregation mechanism (DCA) and artificial butterfly optimization (ABO) based on CH selection allows for energy-efficient data transfer using MMSs in H-WSN. The CH assortment uses the distance parameter, remaining energy, and regular energy for the suggested energy efficiency model. The NS2 platform hosts the final product of the projected H- WSN. The suggested ABO-CH-DCA approach is superior to the baseline protocols in simulations on various measures, including throughput, network lifespan, remaining energy, dead nodes, and live nodes.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129870218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimised Home Electricity Management using Machine Learning","authors":"M. Arunkumar, S. Devadharshini","doi":"10.1109/ICCMC56507.2023.10084159","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084159","url":null,"abstract":"The interactive home automation system that is based on the Internet of Things (IoT) is a cutting-edge technical breakthrough that allows remote control and monitoring of home appliances in addition to the actual purchase of items. The Internet of Objects (IoT) aims to bring everything in the world together under a unified infrastructure, which will give us the ability to manage the things that are around us and provide us with continual information on the state of those things. The fundamental objective of the study is to provide a recommendation for an effective Internet of Things implementation that may be put to use to carry out remote monitoring and control of household appliances. The user interface for this system is implemented in a manner that makes advantage of portable devices. In addition, it provides control of home appliances using mobile devices by employing Wi-Fi as the communication protocol and the Raspberry Pi Uno as the controller. The home user will be responsible for following the system as it travels over the Internet via the web-based user interface. For the purpose of anticipating people's usage of power and so enabling them to become less reliant on it, machine learning is being utilised here.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128333069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chilla Sathvika, Vuyyuru Satwika, Yarrapothu Sruthi, Maddali Geethika, Suneetha Bulla, S. K
{"title":"DDoS Attack Detection on Cloud Computing Services using Algorithms of Machine Learning: Survey","authors":"Chilla Sathvika, Vuyyuru Satwika, Yarrapothu Sruthi, Maddali Geethika, Suneetha Bulla, S. K","doi":"10.1109/ICCMC56507.2023.10083549","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083549","url":null,"abstract":"Nowadays cloud computing services have become the most popular internet-based computing and many organizations use their services. Due to this, many cyber-attacks are happening in the cloud. One of those attacks is the Distributed-Denial-Of-Service (DDoS) attack. It floods unreal traffic, hence troubles the availability of the resources. This article is about DDoS attacks and detection of DDoS attacks using machine learning. There are many famous machine learning algorithms such as naïve bayes, random forest, support vector machines etc. These machine learning algorithms can be used to detect the DDoS attacks on doud. There are several datasets available for the researchers to test their proposed models which include NSL-KDD, ICDX, CIDDS-001, CICIDS 2017 etc. This paper presents a detailed study on different Machine learning based techniques proposed by various authors to detect the DDoS attack in the cloud environment. A brief explanation has been provided on the available datasets and further discussed about the general methodology.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128728574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siva Malar. R, Uma Perumal, Umi Salma. B, Dinesh Komarasamy
{"title":"Rapid Chaotic-based Image Encryption by Combining Chaotic and Non-Chaotic Scrambling Techniques","authors":"Siva Malar. R, Uma Perumal, Umi Salma. B, Dinesh Komarasamy","doi":"10.1109/ICCMC56507.2023.10084012","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084012","url":null,"abstract":"Image encryption has been an appealing and exciting area for researchers recently. Many techniques attempt to enhance the security of images for storing in social media. Chaos theory is frequently used for image encryption due to its unpredictable nature. The classical chaotic based encryption methods are complex in structure and difficult to implement for providing high level securities. In order to solve these issues, anew method for encrypting images using Chaotic Maps (CMs) is proposed in this paper. Initially, a Logistic-Sine-Cosine (LSC)based CM is employed to generate various scrambling functions, such as Zigzag transform, Magic confusion, and Row confusion, and then these scrambling functions are used to modify pixel values to identify a linearity element. Then, these adjusted values are mixed with additional arbitrary sequence generated using the Logistic Cubic Cosine (LCC) based CM. Finally, the pre-encrypted images are combined together so that the generated randomness is dispersed uniformly throughout them. The combination of CM with scrambling functions not only improves security but also accelerates the speed of encryption.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CMOS Schmitt Trigger Circuit and Oscillator Design: The Impact of NBTI Degradation","authors":"A. Vijay, Chusen Duari, L. Garg, A. Singh","doi":"10.1109/ICCMC56507.2023.10084272","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084272","url":null,"abstract":"CMOS Schmitt trigger is a widely used circuit in numerous applications including those for removing noise from signals, to speed up slow edge signals and in the design of oscillators. Aging related degradation in CMOS circuits is a key concern which limits their performance over longer periods (years). This article examines the performance degradation in a CMOS Schmitt trigger circuit over a period of 10 years under the effect of NBTI degradation. The CMOS Schmitt trigger circuit has been used as an oscillator and its output has been examined Variation in dvth with time in p-MOSFETs of the Schmitt trigger circuit and the oscillator circuit have been evaluated. The transient analysis of the Schmitt trigger shows a notable degradation in circuit performance. At year 0 the falling edge transition takes places at 34.8 ns while at year 10 the falling edge transition takes place at 34.6 ns showing a shift of 0.2 ns.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132016373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Object Recognition from Smart Document Images using YOLOv5s","authors":"Bipin Nair B J, Unni Govind S, M. Jose","doi":"10.1109/ICCMC56507.2023.10084220","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084220","url":null,"abstract":"Multiple object recognition from various ID proofs will give more security as well as authentication of the data. In general, various ID proofs showcase objects in various ways, so manually identifying common objects is a time-consuming process. Some of the existing work like YOLOv3, YOLOv5, CNN, and Faster RCNN, all concentrate on one single object detection from the same dataset category, while the proposed work concentrates on heterogeneous datasets with the YOLOv5s model. The proposed work will automate the multiple object detection and recognition from various government id proofs as well as overcoming overlapped object recognition. The proposed model includes deep YOLOv5, which contains 19 convolution layers and 5 pooling layers. The proposed model detects the object from 1000 manually collected various government ID proofs like driving licence, PAN card, Aadhaar card, and voters' ID. The model is trained with 750 datasets and tested with 250 datasets, and finally validated with 50 datasets. The model clearly detects and recognize the name, unique identification number, date of birth, and photograph with 94.6% accuracy. Also, the model recognizes overlapping signatures with better accuracy.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132068135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Deep Learning Approach for Number Plate Detection","authors":"K. N, S. S, Santhiya E, S. D, Dharshika R","doi":"10.1109/ICCMC56507.2023.10084177","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084177","url":null,"abstract":"The number of people in the world now is estimated to be 1.38 billion. As the population of India grows, there is a chance that there will be twice as many automobiles on the road. Numerous methods have been put out for finding and identifying the license plates of automobiles using various technologies and procedures. The license plate detection and identification accomplished in the paper is done by OpenCV and Tensor flow for the detection of the license plate. The second set makes use of CNN (Convolutional Neural Network). First, the input image has been taken and pre-processed. Next, the number plate has been detected and contours are extracted. Finally, the characters have been recognized and the model has been trained using CNN for predicting the characters in the number plate. Comparing to other TensorFlow projects, this system provides the highest accuracy.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogesh Pal, S. Nagendram, Mohammed Saleh Al Ansari, Kamlesh Singh, L.A. Anto Gracious, Pratap Patil
{"title":"IoT based Weather, Soil, Earthquake, and Air Pollution Monitoring System","authors":"Yogesh Pal, S. Nagendram, Mohammed Saleh Al Ansari, Kamlesh Singh, L.A. Anto Gracious, Pratap Patil","doi":"10.1109/ICCMC56507.2023.10083932","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083932","url":null,"abstract":"This research study shows how IoT technology can screen local meteorological conditions and share that information globally. Weather shifts cause extreme rainfall. A flood monitoring system uses NODEMCU ESP8266 to store and retrieve data and inform authorities of rising water levels using ultrasonic sensors and LEDs. Soil moisture affects crop growth. Its microprocessor and sensor improve soil moisture monitoring. An earthquake warning system can detect the slightest vibration before a major earthquake. Due to industry and autos, air quality is getting worse. Air quality and chemical content must be assessed using IoT since it has changed so much. Connected devices and enhanced sensor technology have transformed traditional environmental monitoring into a cutting-edge Smart Environment Monitoring System (SEMS). This paper evaluates SEM aids and research investigations, including air quality, weather, soil, and seismic monitoring systems. SEM applications segment the examination, with a deeper dig into each section's sensors. Discussion findings and analyzed research patterns form the basis for the in-depth analysis that follows the comprehensive review and suggests key SEMS research implications. The authors studied how IoT, machine learning, and other sensorbased advancements have made environmental monitoring smart.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. S. Prasad, A. Sumalatha, J.V.K.S. Chandra Rao, V.V. Vara Prasad
{"title":"An Integrated Wireless Aquaculture Monitoring and Feed Management System","authors":"K. S. Prasad, A. Sumalatha, J.V.K.S. Chandra Rao, V.V. Vara Prasad","doi":"10.1109/ICCMC56507.2023.10084236","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084236","url":null,"abstract":"Shrimp farming is one of the most significant aquaculture activities in India, vannamei shrimp is a type of shrimp that is widely cultivated in India. However, there are a number of issues contributing to the failure of vannamei shrimp production, including poor water quality, improper feeding during the maintenance period, particularly in open ponds. Feeding is the primary factor determining efficiency and cost in aquaculture, so knowing quantity and frequency of feeding is critical for maximizing feed conversion ratio and production efficiency. In this context an integrated system for overall monitoring of aquaculture and feed management is proposed in this paper. The long-term sustainability of shrimp production can be achieved by monitoring water quality, managing feed appropriately, and managing the cultivation environment, according to a survey of farmers in various regions about their farming practices. In order to solve these issues, this study suggests a compact design of automatic integrated feeding system comprising feeder, sensors, aerator, check nets etc. The proposed system provides both in situ and remote monitoring of crucial water quality parameters such as pH, temperature, and turbidity. A customized mobile app is integrated to monitor water quality and manage the feed remotely according to the requirements of the pond and the choice of the user.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130485694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mohandas, N. Sivapriya, A. S. Rao, K. RadhaKrishna, M. B. Sahaai
{"title":"Development of Machine Learning Framework for the Protection of IoT Devices","authors":"R. Mohandas, N. Sivapriya, A. S. Rao, K. RadhaKrishna, M. B. Sahaai","doi":"10.1109/ICCMC56507.2023.10083950","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083950","url":null,"abstract":"Internet of Things (IoT) has a wide range of threats to businesses, according to security experts. Organizations need an intelligent system that can automatically detect suspicious IoT devices linked to their networks. This study introduces a unique security framework powered by machine learning (ML) that automatically adapts to the growing security needs of the IoT sector. There should be a way to identify IoT devices that aren't on a trusted white list. In this article, a machine learning method has been used to recognize IoT device types from a white list by using network traffic data. Seventeen separate IoT devices, each representing one of nine different categories of IoT devices, were manually tagged to train and assess multi-class classifiers. The majority rule was used to classify block listed devices accurately using unidentified in 86% of trial forms, while authorized expedient categories stayed appropriately identified through the real kinds with 88% of forms. The detection times varied for different types of IoT devices. In addition, it shows how the machine learning-based IoT white-listing system can defend itself against hostile attacks.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}